Read Ahead | Cover6 Solutions Workshops

This guide prepares you for our #Intro2Cyber & #SOCAnalystPrep
hands-on cybersecurity training.

First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.

This material summarizes the workshops, the hardware and software requirements, helpful videos, and educational references to help you better understand the class content.

Use the tabs below to view the material for your desired workshop.

Workshop Read Ahead
Workshop Summaries

Today the demand for cybersecurity professionals has never been higher, and the need for skilled defensive (blue team) analysts is especially urgent. At Cover6 we will provide the training you need to find your place in cyber. We focus on the fundamentals of network defense through real-world, hands-on instruction, and our workshop will offer you a path to a successful career as a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after professionals who identify compromised machines and respond to malicious activity. They use defensive security skills and techniques while working to mitigate any damage that may have occurred.

Our Virtual SOC Analyst Prep Workshop offers a comprehensive introduction to defensive tactics, techniques, and procedures. Students will learn various strategies to help defend against several attack scenarios.

A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. Also, our course is designed to help you prepare for the CySA+ exam and reflects the current exam objectives.

In this workshop students will:

  • Analyze .pcap files and logs to identify Indicators of Compromise (IOC’s)
  • Perform various incident handling and response procedures
  • Use tools to implement initial threat hunting techniques
  • Be prepared to work in a SOC on day 1

Helpful Videos to Prepare you for Class

Breaking into Cybersecurity w/ Tyrone E. Wilson

Home Lab Setup | Building an Effective Cybersecurity Learning Environment

Passive Information Gathering

Common Network Services, Threats & Attacks

Active Information Gathering

IPv6 Enumeration & Attacks

Understanding the Metasploit Database

Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience

Additional Educational References
Scroll to Top